ProgressiveCoders / progbot

A slackbot for Progressive Coders
MIT License
10 stars 1 forks source link

Bump actionpack, activesupport, rails and audited #137

Open dependabot[bot] opened 1 year ago

dependabot[bot] commented 1 year ago

Bumps actionpack, activesupport, rails and audited. These dependencies needed to be updated together. Updates actionpack from 6.1.7 to 7.0.4.1

Release notes

Sourced from actionpack's releases.

v7.0.4.1

This is a security release. More information is available in our security announcements forum: https://discuss.rubyonrails.org/c/security-announcements/9

Active Support

  • Avoid regex backtracking in Inflector.underscore

    [CVE-2023-22796]

Active Model

  • No changes.

Active Record

  • Make sanitize_as_sql_comment more strict

    Though this method was likely never meant to take user input, it was attempting sanitization. That sanitization could be bypassed with carefully crafted input.

    This commit makes the sanitization more robust by replacing any occurrances of "/" or "/" with "/ " or " /". It also performs a first pass to remove one surrounding comment to avoid compatibility issues for users relying on the existing removal.

    This also clarifies in the documentation of annotate that it should not be provided user input.

    [CVE-2023-22794]

  • Added integer width check to PostgreSQL::Quoting

    Given a value outside the range for a 64bit signed integer type PostgreSQL will treat the column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan.

    This behavior is configurable via ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.

    [CVE-2022-44566]

Action View

... (truncated)

Changelog

Sourced from actionpack's changelog.

Rails 7.0.4.1 (January 17, 2023)

  • Fix sec issue with _url_host_allowed?

    Disallow certain strings from _url_host_allowed? to avoid a redirect to malicious sites.

    [CVE-2023-22797]

  • Avoid regex backtracking on If-None-Match header

    [CVE-2023-22795]

  • Use string#split instead of regex for domain parts

    [CVE-2023-22792]

Rails 7.0.4 (September 09, 2022)

  • Prevent ActionDispatch::ServerTiming from overwriting existing values in Server-Timing.

    Previously, if another middleware down the chain set Server-Timing header, it would overwritten by ActionDispatch::ServerTiming.

    Jakub Malinowski

Rails 7.0.3.1 (July 12, 2022)

  • No changes.

Rails 7.0.3 (May 09, 2022)

  • Allow relative redirects when raise_on_open_redirects is enabled.

    Tom Hughes

  • Fix authenticate_with_http_basic to allow for missing password.

    Before Rails 7.0 it was possible to handle basic authentication with only a username.

    authenticate_with_http_basic do |token, _|
      ApiClient.authenticate(token)
    end
    

    This ability is restored.

... (truncated)

Commits
  • 23e0345 Version 7.0.4.1
  • 8d82687 Avoid regex backtracking on If-None-Match header
  • cd46b0e Use string#split instead of regex for domain parts
  • e50e26d Fix sec issue with _url_host_allowed?
  • 8015c2c Version 7.0.4
  • f3c345e Merge pull request #45964 from jhawthorn/server_timing_safety
  • 4d25c64 Merge pull request #45221 from jhawthorn/ac_params_eql_fix
  • 47cff40 Format inline code [ci-skip]
  • c5a407d Linkify code references [ci-skip]
  • e874cf5 Fix typos [ci-skip]
  • Additional commits viewable in compare view


Updates activesupport from 6.1.7 to 7.0.4.1

Release notes

Sourced from activesupport's releases.

v7.0.4.1

This is a security release. More information is available in our security announcements forum: https://discuss.rubyonrails.org/c/security-announcements/9

Active Support

  • Avoid regex backtracking in Inflector.underscore

    [CVE-2023-22796]

Active Model

  • No changes.

Active Record

  • Make sanitize_as_sql_comment more strict

    Though this method was likely never meant to take user input, it was attempting sanitization. That sanitization could be bypassed with carefully crafted input.

    This commit makes the sanitization more robust by replacing any occurrances of "/" or "/" with "/ " or " /". It also performs a first pass to remove one surrounding comment to avoid compatibility issues for users relying on the existing removal.

    This also clarifies in the documentation of annotate that it should not be provided user input.

    [CVE-2023-22794]

  • Added integer width check to PostgreSQL::Quoting

    Given a value outside the range for a 64bit signed integer type PostgreSQL will treat the column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan.

    This behavior is configurable via ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.

    [CVE-2022-44566]

Action View

... (truncated)

Changelog

Sourced from activesupport's changelog.

Rails 7.0.4.1 (January 17, 2023)

  • Avoid regex backtracking in Inflector.underscore

    [CVE-2023-22796]

Rails 7.0.4 (September 09, 2022)

  • Redis cache store is now compatible with redis-rb 5.0.

    Jean Boussier

  • Fix NoMethodError on custom ActiveSupport::Deprecation behavior.

    ActiveSupport::Deprecation.behavior= was supposed to accept any object that responds to call, but in fact its internal implementation assumed that this object could respond to arity, so it was restricted to only Proc objects.

    This change removes this arity restriction of custom behaviors.

    Ryo Nakamura

Rails 7.0.3.1 (July 12, 2022)

  • No changes.

Rails 7.0.3 (May 09, 2022)

  • No changes.

Rails 7.0.2.4 (April 26, 2022)

  • Fix and add protections for XSS in ActionView::Helpers and ERB::Util.

    Add the method ERB::Util.xml_name_escape to escape dangerous characters in names of tags and names of attributes, following the specification of XML.

    Álvaro Martín Fraguas

Rails 7.0.2.3 (March 08, 2022)

  • No changes.

Rails 7.0.2.2 (February 11, 2022)

... (truncated)

Commits
  • 23e0345 Version 7.0.4.1
  • 2164d4f Avoid regex backtracking in Inflector.underscore
  • 8015c2c Version 7.0.4
  • ff27758 Revert "Merge pull request #44695 from Edouard-chin/ec-tagger-logger-broadcast"
  • 4a1f224 Merge pull request #45882 from rails/short-inspect-on-test-case
  • a3bd3b5 Backport Redis 5.0 compatibility
  • 67f37ac Fix flaky tests for RedisCacheStore
  • c520e38 Document AS::Cache::MemCacheStore#write options [ci-skip]
  • a74b650 Document AS::Cache::Store#initialize options [ci-skip]
  • f7a82bf Document AS::Cache::Store#read options [ci-skip]
  • Additional commits viewable in compare view


Updates rails from 6.1.7 to 7.0.4.1

Release notes

Sourced from rails's releases.

v7.0.4.1

This is a security release. More information is available in our security announcements forum: https://discuss.rubyonrails.org/c/security-announcements/9

Active Support

  • Avoid regex backtracking in Inflector.underscore

    [CVE-2023-22796]

Active Model

  • No changes.

Active Record

  • Make sanitize_as_sql_comment more strict

    Though this method was likely never meant to take user input, it was attempting sanitization. That sanitization could be bypassed with carefully crafted input.

    This commit makes the sanitization more robust by replacing any occurrances of "/" or "/" with "/ " or " /". It also performs a first pass to remove one surrounding comment to avoid compatibility issues for users relying on the existing removal.

    This also clarifies in the documentation of annotate that it should not be provided user input.

    [CVE-2023-22794]

  • Added integer width check to PostgreSQL::Quoting

    Given a value outside the range for a 64bit signed integer type PostgreSQL will treat the column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan.

    This behavior is configurable via ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.

    [CVE-2022-44566]

Action View

... (truncated)

Commits
  • 23e0345 Version 7.0.4.1
  • d7aba06 Make sanitize_as_sql_comment more strict
  • 8d82687 Avoid regex backtracking on If-None-Match header
  • 2164d4f Avoid regex backtracking in Inflector.underscore
  • cd46b0e Use string#split instead of regex for domain parts
  • e50e26d Fix sec issue with _url_host_allowed?
  • 82bcdc0 Added integer width check to PostgreSQL::Quoting
  • 8015c2c Version 7.0.4
  • f3c345e Merge pull request #45964 from jhawthorn/server_timing_safety
  • ff27758 Revert "Merge pull request #44695 from Edouard-chin/ec-tagger-logger-broadcast"
  • Additional commits viewable in compare view


Updates audited from 4.10.0 to 5.1.0

Changelog

Sourced from audited's changelog.

5.1.0 (2022-12-23)

Changed

Improved

5.0.2 (2021-09-16)

Added

  • Relax ActiveRecord version constraint to support Rails 7 #597

Improved

5.0.1 (2021-06-11)

Improved

  • Don't load associated model when auditing is disabled - @​nut4k1 #584

5.0.0 (2021-06-10)

... (truncated)

Commits


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/ProgressiveCoders/progbot/network/alerts).